Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
dzperl58.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dzperl58.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
iNViSiBLE/Pleditor.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
iNViSiBLE/Pleditor.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
安装说明.url
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
安装说明.url
Resource
win10v2004-20240709-en
General
-
Target
dzperl58.exe
-
Size
1.8MB
-
MD5
a43c6aeb17611747c1b550f01f23b55a
-
SHA1
2ae0fe09002101196feaff9ed11f364a02596406
-
SHA256
ba64f9fa7624433ea60653c3641049fda289c891e969a23a0f03e1e7fea0fb01
-
SHA512
0bfc6b30c1a6eb3f57107f956c26b0d95230db425af9aa6b0bf3665c32853812333a7d14c2c8acaa304c231008e755aae0feb683b49f625ae1808dc065de1c19
-
SSDEEP
49152:iGnJhj1FVTNPwg5gBVxsrhMjOlohVQwULgLX+Nj:jlFF+4rhOjkwiAM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2764 is-KOQHV.tmp -
Loads dropped DLL 3 IoCs
pid Process 1788 dzperl58.exe 2764 is-KOQHV.tmp 2764 is-KOQHV.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 is-KOQHV.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2764 1788 dzperl58.exe 30 PID 1788 wrote to memory of 2764 1788 dzperl58.exe 30 PID 1788 wrote to memory of 2764 1788 dzperl58.exe 30 PID 1788 wrote to memory of 2764 1788 dzperl58.exe 30 PID 1788 wrote to memory of 2764 1788 dzperl58.exe 30 PID 1788 wrote to memory of 2764 1788 dzperl58.exe 30 PID 1788 wrote to memory of 2764 1788 dzperl58.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dzperl58.exe"C:\Users\Admin\AppData\Local\Temp\dzperl58.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\is-KU70V.tmp\is-KOQHV.tmp"C:\Users\Admin\AppData\Local\Temp\is-KU70V.tmp\is-KOQHV.tmp" /SL4 $400C4 "C:\Users\Admin\AppData\Local\Temp\dzperl58.exe" 1568416 583682⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
663KB
MD5267548fab3a91835de6398fa26d2cb4f
SHA18b1b50d069fafea5a50a05054fa20f5ad4b0a066
SHA256675a56ea0b5bf5e90cd4650dd7d25c5e8630a8d27cb641d7eaac8c1b809dc398
SHA51217c1363412475774a053e0f2e93fda948038bda252bde1e428c327b7a31bb6f2c8be6cc3afd027eeda70944440ad52e899372b5f9838032b7d0db261fbbdcc65